System Configuration
2 min
once you have a tetherfi secure work from home environment and admin login credentials, you can go through the following steps to configure and start using the product setup your organizational structure docid\ fnzhj8 4t7 brpyyswkzt configure initial roles docid\ fsya bvujbjw2wgch3erv for your supervisors and agents define your initial remote security rules docid\ mxqk0wmz iye61wlioe2h enable features you want for different parts of your organization using features docid hzx326waemkarm7abbhg use the appropriate installation docid\ wq yjw737rby2vq5oh9pk to install secure work from home on your agent desktops (and in your vdi environment if appropriate) big picture the following diagram shows the 5 core components of secure work from home configuration and their relationships to each other these components are introduced below the diagram, and detailed instructions for configuring these are available in later subsections feature sets different divisions, departments, or teams can have different sets of features turned on or off (e g this department does continual background face authentication, while this other team has watermarks configured) for more information, see features docid hzx326waemkarm7abbhg organizational structure tetherfi supports 4 levels of organizational structure for the purposes of defining who can see, do, and administer what for more information, see organizational structure docid\ fnzhj8 4t7 brpyyswkzt users secure work from home has 3 primary user profiles administrators, supervisors, and users (or agents) agents can only be associated with a team in the organizational structure for more information, see user management docid\ mvj7aa qttnlmch7xlvnf role based access control roles are used to control what administration capabilities (if any) and/or reporting capabilities (if any) a user has for more information, see roles docid\ fsya bvujbjw2wgch3erv remote security rules secure work from home allows highly configurable control over what should happen when certain events occur (e g when face authentication fails), and these rules can be different for different user roles for more information, see remote security rules docid\ mxqk0wmz iye61wlioe2h